A vulnerability classified as critical was found in Linux Kernel up to 6.12.9/6.13-rc6. This vulnerability affects the function netfs_extract_user_iter. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2025-21643. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.71/6.12.9/6.13-rc6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component sysctl. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2025-21642. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.9/6.13-rc6. Affected by this issue is some unknown functionality of the component sysctl. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2025-21641. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. Affected is an unknown function of the component sysctl. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2025-21639. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. Affected by this vulnerability is an unknown functionality of the component cookie_hmac_alg. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2025-21640. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. It has been classified as critical. This affects an unknown part of the component sysctl. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-21638. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.9/6.13-rc6. Affected is an unknown function. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2025-21635. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component sctp. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2025-21636. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 and classified as critical. Affected by this issue is some unknown functionality of the component sysctl. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2025-21637. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.9/6.13-rc6. This affects the function thread_group_cputime of the component sqpoll. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-21633. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.